Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 3, 2024
Year: 2024
Issue: 3
Pages: 155
29
6220
Previous issue
All issues
Next issue
Submit Your Paper
XML
Publication schedule
№1 March 2026
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
The probabilitic-theoretic models of physical random number generators
Information security aspects
Bogdanov D. S.
Logachev A. S.
Mironkin V. O.
8
550
Pages: 9-19
Application of indicator functions in models of detection and neutralization of malicious information objects
Information security aspects
Garkushev A. Yu.
Vyvolokina A. V.
Fokina S. I.
Suprun A. F.
2
493
Pages: 20-29
Construction of deterministic and stochastic mathematical models of information system protection
Information security aspects
Rybkina O. V.
5
544
Pages: 30-39
Security assessment of Big Data systems
Information security application
Zaitzeva V. V.
Poltavtseva M. A.
4
526
Pages: 40-57
Ways to obtain evidential information from a computer using Open Source
Information security application
Tatarnikova T. M.
Sikarev I. A.
Rychikhin D. A.
2
520
Pages: 58-68
Application of distributed ledger technology to protect smart city information systems
Critical information infrastructure security
Busygin A. G.
Kalinin M. O.
3
523
Pages: 69-79
Assessment of the possibility of upgrading information security systems in the planned time frame
Critical information infrastructure security
Zegzhda D. P.
Suprun A. F.
Anisimov E. G.
Anisimov Vladimir G.
0
500
Pages: 80-87
An integral indicator of the effectiveness of the use of a group of unmanned aerial vehicles in solving aerial photography tasks
Cyber-physic systems security
Kurakin A. S.
0
524
Pages: 88-93
Analysis and prediction of states of industrial networks with adaptive topology based on network motifs
Cyber-physic systems security
Pavlenko E. Yu.
1
508
Pages: 94-108
Research on the performance of AutoML platforms in confidential computing
Software security
Bezzateev S. V.
Zhemelev G. A.
Fomicheva S.G.
2
494
Pages: 109-126
Approach to creating personalised LLM agents based on MBTI personality traits
Software security
Bogina V. M.
Velichko K. А.
Makeeva A. A.
Dakhnovich A. D.
Zegzhda D. P.
1
559
Pages: 127-141
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
Software security
Gololobov N. V.
1
479
Pages: 142-154
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept